US20200169455A1 - Function management system, information processing apparatus, and machine-readable, non-transitory recording medium storing instructions for executing an information processing method - Google Patents

Function management system, information processing apparatus, and machine-readable, non-transitory recording medium storing instructions for executing an information processing method Download PDF

Info

Publication number
US20200169455A1
US20200169455A1 US16/686,296 US201916686296A US2020169455A1 US 20200169455 A1 US20200169455 A1 US 20200169455A1 US 201916686296 A US201916686296 A US 201916686296A US 2020169455 A1 US2020169455 A1 US 2020169455A1
Authority
US
United States
Prior art keywords
server
function
information
information processing
processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/686,296
Other languages
English (en)
Inventor
Noriaki Nakagawa
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ricoh Co Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Assigned to RICOH COMPANY, LTD. reassignment RICOH COMPANY, LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NAKAGAWA, NORIAKI
Publication of US20200169455A1 publication Critical patent/US20200169455A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0668Management of faults, events, alarms or notifications using network fault recovery by dynamic selection of recovery network elements, e.g. replacement by the most appropriate element after failure
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/202Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where processing functionality is redundant
    • G06F11/2038Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where processing functionality is redundant with a single idle spare processing component
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/22Arrangements for detecting or preventing errors in the information received using redundant apparatus to increase reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management

Definitions

  • the present disclosure relates to a function management system, an information processing apparatus, and a machine-readable, non-transitory recording medium storing instructions which, when executed by at least one processor, cause the processor to perform an information processing method.
  • An information processing apparatus such as a server can implement various functions by executing a program and can increase or decrease the number of functions by installing or uninstalling the program. Some programs require an operation called activation that enables the function of the program during or after installation.
  • usage authorization for the program is given, license information for proving the usage authorization is generated, and the license information is registered in a server or information processing apparatus. For this reason, with respect to a program that requires activation, when the function is used, the registered license information is referenced to determine whether the function can be used.
  • Embodiments of the present disclosure describe a function management system, an information processing apparatus, and a machine-readable, non-transitory recording medium storing instructions which, when executed by at least one processor, cause the processor to perform an information processing method.
  • the function management system determines whether a server in which a function is introduced is a predetermined server based on settings information set for a redundant configuration including at least two servers, acquires identification information for identifying the server in which the function is introduced when the server is the predetermined server; and determines whether the function can be used based on the identification information acquired by the processor.
  • FIG. 1 is a diagram illustrating an example of a system configuration having a redundant configuration
  • FIG. 2 is a diagram illustrating activation of a program
  • FIG. 3 is a block diagram illustrating an example of a hardware configuration of a server included in a system having a redundant configuration
  • FIG. 4 is a block diagram illustrating an example of a functional configuration of a first server
  • FIG. 5 is a flowchart illustrating an activation process executed by the first server
  • FIG. 6 is a block diagram illustrating an example of a functional configuration of a second server.
  • FIG. 7 is a flowchart illustrating a process executed by the second server.
  • FIG. 1 is a diagram illustrating an example of a system configuration having a redundant configuration.
  • a redundant system includes, for example, two servers 10 and 11 and a database 12 .
  • the two servers 10 and 11 are installed with the same program in order to provide the same service using the same function.
  • the function may be a single function or a plurality of functions.
  • the program may be a single program, or a program package composed of a plurality of programs for implementing a plurality of functions.
  • the function may be any function, such as a function for controlling printing, a function for distributing data, a function for setting a workflow, and the like.
  • the database 12 may be provided as a storage device separate from the servers 10 and 11 or may be a storage device in the server 10 or a storage device in the server 11 .
  • the servers 10 and 11 install a program from a storage medium such as a compact disk-read only memory (CD-ROM) or a universal serial bus (USB) memory in order to implement the function.
  • the program may be downloaded and installed from a content server or the like through a network to which the servers 10 and 11 are connected.
  • a content server or the like Through a network to which the servers 10 and 11 are connected.
  • the program cannot be used just by being installed but needs to be activated. Activation is performed during or after installation.
  • FIG. 2 is a diagram illustrating the activation executed to use the function of the program installed in the server 10 .
  • the server 10 is connected to the license server 14 through the network 13 .
  • the license server 14 is a device that creates license information.
  • the program is installed by a user operation.
  • Information (product key) for identifying the usage authority (license) is assigned to the program, and the user performs license authentication by inputting and transmitting the product key to the license server 14 .
  • a media access control (MAC) address, a random number unique to the server 10 generated by the server 10 , which is one of the unique identifiers (IDs), a server name (host name) set in the server 10 , etc. are sent together.
  • MAC media access control
  • Two of the above described information are used as the unique information, but are not limited to two, and only one may be used, or three or more may be used. Further, as long as the information is unique to the server 10 , information such as a manufacturing number (serial number) of a hard disk drive (HDD) mounted on the server 10 may be used.
  • a manufacturing number serial number
  • HDD hard disk drive
  • the license server 14 determines validity of the product key, generates license information, and registers the license information in the database 12 .
  • the validity of the product key is determined using, for example, the license management table, considering whether a license has already been granted, and if multiple licenses are available, whether the number of licenses has been reached.
  • the license information is created using, for example, the above-described MAC address, random number, host name, and the like, encrypted using a private key held by the license server 14 , and registered in the database 12 . The registration described above completes the activation.
  • the license server 14 provides the server 10 with a public key corresponding to the above private key.
  • the server 10 can decode the license information in the database 12 with the public key, and extract the MAC address, random number, host name, and the like.
  • the encryption of the license information is not limited to using the public key and the private key, and any method known so far can be used.
  • the server 10 When using the function of the program, the server 10 uses the license information registered in the database 12 and determines whether the function can be used. Then, the server 10 executes the program and provides a service using the function.
  • FIG. 3 is a block diagram illustrating an example of a hardware configuration of the server 10 . Since the server 11 has the same hardware configuration as the server 10 , description of the hardware configuration of the server 11 is omitted.
  • the server 10 includes a central processing unit (CPU) 20 , a read only memory (ROM) 21 , a random access memory (RAM) 22 , an HDD 23 , a communication interface (I/F) 24 , an input/output I/F 25 , an input device 26 , and a display device 27 as hardware.
  • CPU central processing unit
  • ROM read only memory
  • RAM random access memory
  • HDD 23 high definition memory
  • I/F input/output I/F 25
  • input device 26 input device 26
  • display device 27 a display device 27 as hardware.
  • the CPU 20 controls the entire server 10 and performs transmission of a product key or the like to the license server 14 , acquisition of encrypted license information, decoding of encrypted license information, and the like.
  • the ROM 21 stores a boot program for starting the server 10 and the like.
  • the HDD 23 stores an operating system (OS) that implements control of the server 10 and a program that implements the processing such as decoding.
  • the RAM 22 provides a work area for the CPU 20 .
  • the ROM 21 stores the MAC address
  • the HDD 23 has a registry as a place for storing various settings information regarding the server 10 and stores the random number and the host name in the registry.
  • the communication I/F 24 connects the server 10 to the network 13 and enables communication with the license server 14 .
  • the input device 26 receives user input, and the display device 27 displays input information and the like.
  • the input/output I/F 25 controls input from the input device 26 and display on the display device 27 .
  • FIG. 4 is a block diagram illustrating a functional configuration of the server 10 .
  • the server 10 implements each functional unit by the CPU 20 executing the program stored in the HDD 23 , and executes each process by each functional unit.
  • all the functions are implemented by the functional unit generated by executing the program.
  • the present disclosure is not limited to this, and a part or all of the functions may be implemented by hardware such as a circuit.
  • Some or all of these functional units may not be mounted in the server 10 and may be mounted in at least one other devices or may be distributed and installed in the server 10 and at least one other devices.
  • the server 10 determines whether the function can be used.
  • the server 10 includes a decoding unit 30 , an acquisition unit 31 , and a determination unit 32 as functional units in order to execute this determination process.
  • the decoding unit 30 decodes the encrypted license information stored in the database 12 .
  • the license information is decoded and the MAC address, random number, etc., included in the license information are extracted. In this example, it is assumed that a MAC address and a random number are used.
  • the acquisition unit 31 acquires a MAC address and a random number from the ROM 21 and the HDD 23 .
  • the determination unit 32 compares the MAC address and random number acquired by the acquisition unit 31 with the MAC address and random number included in the decoded license information and determines whether acquired information and stored information match. When the acquired information and the stored information match, the determination unit 32 determines that the activation has been completed, indicating that use of the function is permitted. When it is determined that the program has been activated, the server 10 is permitted to use the function of the program.
  • the determination unit 32 determines that the program is not activated, the server 10 is denied use of the function.
  • a process for determining whether a function can be used by the server 10 is described below in detail with reference to FIG. 5 .
  • the process starts by initiating the program.
  • the program is associated with identification information that identifies the program.
  • the program identification information is also associated with encrypted license information stored in the database 12 .
  • step S 501 the acquisition unit 31 acquires from the database 12 the encrypted license information associated with the identification information registered in the database 12 based on the identification information for identifying the program.
  • step S 502 the decoding unit 30 decodes the license information encrypted with the private key of the license server 14 with the public key provided by the license server 14 and extracts the MAC address and random number included in the license information.
  • step S 503 the acquisition unit 31 acquires the MAC address and random number stored in the ROM 21 and HDD 23 .
  • the determination unit 32 determines whether the MAC address and random number extracted in step S 502 and the MAC address and random number acquired in step S 503 match.
  • step S 504 When it is determined in step S 504 that the license information match, the process proceeds to step S 505 , where it is determined that the program has been activated and the use of the function of the program is permitted. On the other hand, when it is determined that the license information does not match, the process proceeds to step S 506 , where it is determined that the use of the function of the program is denied. When the determination is completed, the determination process ends.
  • FIG. 6 illustrates a functional configuration of the server 11 in which the same program is installed for redundancy and the same function is used.
  • the function of the program installed on the server 11 is used, activation similar to that on the server 10 is required. This is because the license information registered in the database 12 cannot be shared between the server 10 and the server 11 .
  • the MAC address and random number included in the license information are those of the server 10 , and the server 11 has another MAC address and random number resulting in a determination that the license information does not match, and the use of the function is restricted.
  • the server 11 has a decoding unit 40 , a first determination unit 41 , a second determination unit 42 , an acquisition unit 43 , and a third determination unit 44 as functional units, in order to enable the use of the function without activation. Similar to the server 10 , these functional units are implemented by the CPU executing a program.
  • these functional units are not limited to those implemented by executing a program, and some or all of these functional units may be implemented by hardware such as a circuit. Some or all of these functional units may not be mounted in the server 11 , may be mounted in at least one other devices, or may be distributed and installed on the server 11 and at least one other devices.
  • the decoding unit 40 decodes the encrypted license information stored in the database 12 .
  • the license information is decoded, and the MAC address and random number included in the license information are extracted.
  • the MAC address and random number included in the license information are those of the server 10 .
  • the acquisition unit 43 acquires a MAC address and a random number from the ROM and the HDD.
  • the MAC address and random number are those of the server 11 .
  • the third determination unit 44 determines whether the extracted MAC address and random number and the acquired MAC address and random number match. The third determination unit 44 determines that the license information does not match, since the servers are different.
  • settings information regarding the redundant configuration and system information indicating the usage authorization of the function are stored in the storage unit such as the ROM or HDD.
  • the server that is normally operated is a primary server
  • a replacement server that is switched when malfunction occurs is a secondary server.
  • the secondary server is a predetermined server to be switched from another server of the servers in the redundant configuration, when a malfunction occurs in the another server in the redundant configuration.
  • the settings information is information indicating that the server 10 is the primary server and the server 11 is the secondary server.
  • the settings information may include information for identifying the primary server, such as an IP address. Since the IP address is an example, any information may be used as long as the primary server can be identified.
  • the system information is identification information for identifying a server that is permitted to use the functions of the program, such as a host name.
  • the host name is an example, and any information may be used as long as the server can be identified.
  • the first determination unit 41 determines whether the server 11 is the secondary server based on the settings information acquired by the acquisition unit 43 .
  • the acquisition unit 43 acquires the host name as the identification information for identifying the server 11 .
  • the second determination unit 42 compares the host name acquired by the acquisition unit 43 with the system information (host name) stored in the storage unit and determines whether activation has been made based on whether the host names match.
  • the server 11 When the second determination unit 42 determines that the activation has been completed, the server 11 is permitted to use the function of the program. As a result, the server 11 can use the function of the program without performing activation.
  • the server 11 is denied use of the function of the program.
  • the third determination unit 44 determines whether or not the function can be used based on the MAC address of the server 11 and the MAC address included in the license information. In general, since the servers are different and the determination will be that the server cannot use the function, the third determination unit 44 is not essential.
  • a process for determining whether a function of a program can be used by the server 11 is described below in detail with reference to FIG. 7 .
  • FIG. 7 is a flowchart illustrating a process executed by the second server.
  • the server 11 functions as a substitute for the server 10 .
  • a monitoring unit mounted on the server 10 monitors whether the server 10 has failed or stopped.
  • the server 11 receives a notification that the server 10 has stopped, the server 11 starts to provide the same service using the same function. Accordingly, the process starts in response to receiving the notification that the server 10 has stopped.
  • the OS is Windows (registered trademark)
  • the monitoring unit can monitor the failure of the server 10 using the windows service.
  • step S 701 the acquisition unit 43 acquires encrypted license information registered in the database 12 .
  • the license information is associated with identification information for identifying the program, and the corresponding license information can be acquired by referring to the identification information of the program to be executed by the server 11 . Since the same program is installed on the servers 10 and 11 , the same identification information is assigned to the program.
  • step S 702 the decoding unit 40 decodes the license information encrypted with the private key of the license server 14 with the public key provided by the license server 14 and extracts the MAC address and random number included in the license information.
  • the MAC address and random number are those of the server 10 .
  • step S 703 the acquisition unit 43 acquires the MAC address and random number stored in the ROM 21 and HDD 23 .
  • the third determination unit 44 determines whether the MAC address and random number extracted in step S 702 and the MAC address and random number acquired in step S 703 match. In a system with a redundant configuration, the MAC address and random number do not match.
  • step S 705 the acquisition unit 43 acquires settings information.
  • step S 706 the first determination unit 41 determines whether the server 11 is a secondary server based on the settings information.
  • step S 707 the acquisition unit 43 acquires a host name stored as system information.
  • the acquisition unit 43 also acquires the host name set in the server 11 .
  • step S 708 the second determination unit 42 compares the acquired host names to determine whether they match.
  • step S 709 determines that the program has been activated and the use of the function of the program is permitted.
  • step S 710 determines that the use of the function of the program is denied.
  • step S 704 When it is determined in step S 704 that the license information match, an error may be occurring. When it is determined in step S 706 that the server is not the secondary server, the settings information may not be set. When it is determined in step S 708 that the host names do not match, the host name may not be set as the system information, or the host name may be entered incorrectly.
  • System redundancy is not limited to preparing replacement devices (servers) with the same function, but resources on one server may be divided into two logical partitions, one for normal use and the other for replacement. Moreover, three or more devices and logical partitions may be used to implement redundant configuration, instead of two for normal use and alternative use.
  • the server 11 which is the secondary server, and determining whether the program is activated, it is possible to use the functions of the two servers 10 and 11 with a single activation on the server 10 .
  • the present disclosure has been described with the above-described embodiments as the function management system, information processing apparatus, and a machine-readable, non-transitory recording medium storing instructions, the present disclosure is not limited to the above-described embodiments.
  • the present disclosure can be modified within the scope of those skilled in the art, such as other embodiments, additions, modifications, deletions, etc., and as long as effects of the present disclosure are exhibited in any of the embodiments, the embodiments are included in the scope of the present disclosure.
  • Processing circuitry includes a programmed processor, as a processor includes circuitry.
  • a processing circuit also includes devices such as an application specific integrated circuit (ASIC), digital signal processor (DSP), field programmable gate array (FPGA) and conventional circuit components arranged to perform the recited functions.
  • ASIC application specific integrated circuit
  • DSP digital signal processor
  • FPGA field programmable gate array

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Automation & Control Theory (AREA)
  • Stored Programmes (AREA)
  • Hardware Redundancy (AREA)
  • Storage Device Security (AREA)
US16/686,296 2018-11-27 2019-11-18 Function management system, information processing apparatus, and machine-readable, non-transitory recording medium storing instructions for executing an information processing method Abandoned US20200169455A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2018221407A JP7151419B2 (ja) 2018-11-27 2018-11-27 代替用サーバ、方法およびプログラム
JP2018-221407 2018-11-27

Publications (1)

Publication Number Publication Date
US20200169455A1 true US20200169455A1 (en) 2020-05-28

Family

ID=68426297

Family Applications (1)

Application Number Title Priority Date Filing Date
US16/686,296 Abandoned US20200169455A1 (en) 2018-11-27 2019-11-18 Function management system, information processing apparatus, and machine-readable, non-transitory recording medium storing instructions for executing an information processing method

Country Status (4)

Country Link
US (1) US20200169455A1 (fr)
EP (1) EP3660708B1 (fr)
JP (1) JP7151419B2 (fr)
CN (1) CN111222100A (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230143321A1 (en) * 2021-11-09 2023-05-11 Dell Products L.P. Secure base activation image for edge day zero secure infrastructure provisioning

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU7149498A (en) * 1997-04-25 1998-11-24 Symbios, Inc. Redundant server failover in networked environment
JP2006259810A (ja) * 2005-03-15 2006-09-28 Matsushita Electric Ind Co Ltd デバッグ装置
US7869346B2 (en) * 2006-02-28 2011-01-11 Symbol Technologies, Inc. Methods and apparatus for cluster licensing in wireless switch architecture
JP5107159B2 (ja) 2008-06-30 2012-12-26 株式会社リコー 画像形成装置、アクティベーション方法、プログラム、記憶媒体
US8898469B2 (en) * 2010-02-05 2014-11-25 Motorola Mobility Llc Software feature authorization through delegated agents
EP2490143A1 (fr) * 2011-02-10 2012-08-22 Thomson Licensing Procédé et dispositif pour contrôle la distribution de licences
JP5719799B2 (ja) 2012-05-08 2015-05-20 株式会社日立製作所 ソフトウェアライセンスの認証を行う情報処理装置および通信システム、ソフトウェアライセンス認証方法
US9961052B2 (en) * 2013-06-28 2018-05-01 Extreme Networks, Inc. Virtualized host ID key sharing
CN104639367B (zh) * 2015-01-04 2018-04-03 中国联合网络通信集团有限公司 一种实现主备服务器切换的方法及系统
JP2016106308A (ja) * 2016-01-20 2016-06-16 曽根 利仁 ライセンス方法

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230143321A1 (en) * 2021-11-09 2023-05-11 Dell Products L.P. Secure base activation image for edge day zero secure infrastructure provisioning

Also Published As

Publication number Publication date
JP2020087018A (ja) 2020-06-04
EP3660708A1 (fr) 2020-06-03
EP3660708B1 (fr) 2024-04-17
JP7151419B2 (ja) 2022-10-12
CN111222100A (zh) 2020-06-02

Similar Documents

Publication Publication Date Title
US10397212B2 (en) Information device, data processing system, data processing method, and non-transitory storage medium for executing content upon authentication
US7844768B2 (en) Blade server system and method of managing same
US20180121656A1 (en) Validating operating firmware of a periperhal device
US20070130481A1 (en) Power control method and system
US10657232B2 (en) Information processing apparatus and method of controlling information processing apparatus
US8949482B2 (en) Device management apparatus, device management system, information management method, information management program and recording medium storing the program therein
US9001364B2 (en) Management system, image forming apparatus, management system control method, and image forming apparatus control method for migration of setting values of an application that operates in the image forimng apparatus
US10425412B2 (en) Dynamic generation of key for encrypting data in management node
US20130262700A1 (en) Information processing system and virtual address setting method
US10445503B2 (en) Secure persistent software updates
US20170286097A1 (en) Method to prevent operating system digital product key activation failures
US20070011407A1 (en) Method and system for reconfiguring functional capabilities in a data processing system with dormant resources
JP2011150439A (ja) 情報処理装置、情報処理装置のハードウェア設定方法及びそのプログラム
US20200169455A1 (en) Function management system, information processing apparatus, and machine-readable, non-transitory recording medium storing instructions for executing an information processing method
JPWO2011051999A1 (ja) 情報処理装置及び情報処理装置の制御方法
JP5765451B2 (ja) 機器管理装置、機器管理システム、及びプログラム並びに機器管理方法
US20190044944A1 (en) Secure default user account for embedded systems
CN110602121B (zh) 一种网络密钥获取方法、装置和计算机可读存储介质
US20140059661A1 (en) Management device, computer-readable recording medium, and management method
JP2011145827A (ja) 仮想バスシステム、およびデバイス管理方法
CN113132108A (zh) 一种数字证书的吊销、校验方法及装置
US8844006B2 (en) Authentication of services on a partition
TWI782766B (zh) IPMI及Redfish帳號同步方法
US11405390B2 (en) Device management system, and method
US20200293336A1 (en) Server and method of replacing a server in a network

Legal Events

Date Code Title Description
AS Assignment

Owner name: RICOH COMPANY, LTD., JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NAKAGAWA, NORIAKI;REEL/FRAME:051033/0245

Effective date: 20191111

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION